A comparison of two torus-based k-coteries
- 27 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
We extend a torus-based coterie structure for distributed mutual exclusion to allow k multiple entries in a critical section. In the original coterie, the system nodes are logically arranged in a rectangle, called a torus, in which the last row (column) is followed by the first row (column) using end wraparound. A torus quorum consists of a head and a tail, where the head contains one entire row and the tail contains one node from each of the s succeeding rows, s⩾1 is a system parameter. It has been shown that by setting s=[h/2], where h=the number of rows, the collection of torus quorums form an equal-sized, equal-responsibility coterie. In this paper we propose two extensions to k-coteries: the Div-Torus method divides the system nodes into k clusters and runs a separate instance of a torus coterie in each cluster; the k-Torus method uses quorums of tail s=[h/(k+1)]. We compare the quorum size and quorum availability of the two proposed methods, and against the DIV method which is based on the majority quorums in each of the k divided clusters, assuming the node reliability is a constant. Numerical data demonstrate that DIV and Div-Torus have similar system availability, better than that of the k-Torus, although all 3 methods' availability becomes comparable when the node reliability is higher than 0.9. However, Div-Torus has the smallest quorum size and k-Torus the second smallest, which has the potential of causing less network traffic when requesting permissions from a quorumKeywords
This publication has 18 references indexed in Scilit:
- k-coteries for fault-tolerant k entries to a critical sectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Nondominated k-coteries for multiple mutual exclusionInformation Processing Letters, 1994
- A distributed k-mutual exclusion algorithm using k-coterieInformation Processing Letters, 1994
- A Taxonomy of Distributed Mutual ExclusionJournal of Parallel and Distributed Computing, 1993
- The grid protocol: a high performance scheme for maintaining replicated dataIEEE Transactions on Knowledge and Data Engineering, 1992
- Bounded ignorance in replicated systemsPublished by Association for Computing Machinery (ACM) ,1991
- A distributed algorithm for multiple entries to a critical sectionInformation Processing Letters, 1989
- A √N algorithm for mutual exclusion in decentralized systemsACM Transactions on Computer Systems, 1985
- An optimal algorithm for mutual exclusion in computer networksCommunications of the ACM, 1981
- Time, clocks, and the ordering of events in a distributed systemCommunications of the ACM, 1978